About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 43. Chapters: Telnet, Secure Shell, Back Orifice, Back Orifice 2000, Novell ZENworks, WebEx, RHUB Inc., GoToMyPC, Absolute Manage, Remote desktop software, Citrix XenApp, Remote Administrator, Goverlan Remote Administration Suite, Ericom Software, Goverlan Remote Control Software, System Center Configuration Manager, RealVNC, Apple Remote Desktop, LANDesk, Proxy Networks, Inc., SSHFS, Bomgar, Gbridge, LogMeIn, Remote Administration Tool, NetBus, Sub7, SimpleHelp, Bandook, Web-based SSH, VIA3, ISL Light, ScriptLogic, TightVNC, PJ Technologies, Nuclear RAT, OmNovia Technologies, WMIX Software, AetherPal, Netop Remote Control, DameWare, QVD, UltraVNC, Radmind, Spacewalk, TalkPoint, Splashtop Remote, NetSupport Manager, Crossloop, Systancia, Satellite, TigerVNC, EchoVNC, Lost Door RAT, Insurrection, VHFFS, Citrix WinFrame, Ctelnet, Sputnik Agent. Excerpt: Secure Shell or SSH is a network protocol that allows users to open a window on a local computer and connect to a remote computer as if they were sitting there. SSH allows data to be exchanged using a secure channel between two networked devices. The two major versions of the protocol are referred to as SSH1 or SSH-1 and SSH2 or SSH-2. Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for Telnet and other insecure remote shells, which send information, notably passwords, in plaintext, rendering them susceptible to packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary. Anyone can produce a matching pair of different keys (public and private). The public key is placed on all computers that must ...